Communications CUIF SEVENNo, 3-53 (2) Army Security Agency (ASA) ~- will provide a communications security unit for monitoring task force circuits in the ENIWETOK BIKINI area, (3) USAF Security Service - will provide special SSM-~4 (SAMSON) synchronous mxer maintenance personnel and equipment required for principal task force radioteletype circuits. (4) Primary Relay Station (UHP), OAHU, T.H. - will be the prin- cipal relay facility for task force traffic, other than air task group, to and from the ENIWETOK-BIKINI area. (5) Major Relay Station (JHK), KWAJALEIN, M.I. ~ will be the principal relay facility for air task group traffic to and from the ENIWETOK-BIKINI area; will also provide an alternate relay facility for other task force traffic. (6) Communication Center (UWFJA}, LOS ALAMOS, NEW MEXICO - will provide an alternate relay facility for task force traffic destined for ZI addressees. 3. Guiding Principles a. No radio circuit or telephone circuit having a radio link is approved for transmission of classified information in the clear. b. All TOP SECRET and RESTRICTED DATA traffic will be enciphered off-line prior to transmission. c. Code names will not be assigned to individuals. sonal names on voice radio circuita is authorized. The use of per- d. All messages for transmission to addressees outside the ENIWETOKBIKINI operational area will be routed t rough the Joint Relay ter, p excepts: ; g = my ries ore (] . (1) Unauthorized entry, contact and amplifying reports which ma:y be transmitted over normal Navy circuits. ow (2) Routine administrative messages not concerned with Operation CASTLE which may be transmitted over normal Navy circuits. (3) Traffic between CTG 7.3 and VP=29 Detachment, KWAJALEIN. (4) Traffic between CTG 7.4 and the weather island detachments. (5) Unclassified traffic (i.e., weather, aircraft movement) between AACS, KWAJALEIN and AACS Detachment, ENIWETOK. (6) Intra-task group operational traffic. O“Fzfe Joint 7 (W Other traffic as directed by CUTF SEVEN. Commanders are responsible that communication security is observed at all times. 1-2